10
ICTL Tingkatan 2 30 Oktober 2009 1 jam SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH TELOK MAS, 75460 MELAKA FINAL EXAM – 2009 ICTL TINGKATAN 2 1 jam DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO Instruction: Answer all questions in this question paper. Prepared by: Checked by: Authorised by: NAMA : _____________________________ FORM :

latihan ictl tingkatan 2

  • Upload
    syanisa

  • View
    299

  • Download
    7

Embed Size (px)

DESCRIPTION

ictl tingkatan 2

Citation preview

Page 1: latihan ictl tingkatan 2

ICTLTingkatan 230 Oktober 20091 jam

SEKOLAH MENENGAH KEBANGSAAN AGAMA SHARIFAH RODZIAH

TELOK MAS, 75460 MELAKA

FINAL EXAM – 2009

ICTL

TINGKATAN 2

1 jam

DO NOT OPEN THIS QUESTION PAPER UNTIL YOU ARE ASKED TO DO SO

Instruction:

Answer all questions in this question paper.

Prepared by: Checked by: Authorised by:

……………… ……………… ………………

(Hj. Abdul Aziz Mohd Yunos)

This paper consist 7 printed pages

NAMA : _____________________________

FORM : _____________________________

Page 2: latihan ictl tingkatan 2

CIRCLE THE BEST ANSWER

1. Which of the following answers are TRUE about NETIQUETTE?

I the etiquette used in communicating with others through the Internet

II often include avoiding cross-posting

III often include using hard electronic signatures

IV the proper behavior in using computer especially the Internet

A. I and II

B. II, III and IV

C. I, II and IV

D. I, II, III

2. Which one is the most suitable function of Web Search Engine?

A. enables users to find the lost people

B. enables users to specify criteria about an item of interest and have the engine find the

matching items on the World Wide Web

C. enables users to search for their needs and have the engines to process their needs

D. enables users to find an document or file and have the engine find the matching file in the

computer storage

3. Data inside a table of database is arranged by column name _______ and row named ________.

A. Record, field

B. Field, record

C. Record, form

D. Field, bar

4. NETIQUETTE often include avoid these all things EXCEPT…

A. cross-posting

B. using simple electronic signatures

C. communicate to other people in chat room

D. technique used to minimize the effort required to read a post

2

Page 3: latihan ictl tingkatan 2

5. Which are the examples of Search Engines?

I Yahoo!

II Google

III Alta Vista

IV Cold Bot

A. I and II

B. I, II and III

C. II, III and IV

D. I, II, III and IV

6. Below are the important peripherals that used for INTERNET COMMUNICATION EXCEPT?

A. Microphone

B. Earphone

C. Public Phone

D. Web camera

7. Which are the forms of INTERNET COMMUNICATIONS?

I Chatting

II Net meeting

III Conferencing

IV Forum

A. I, II and III

B. I, II and IV

C. II, III and IV

D. I, II, III and IV

8. A database is made up of all the following components EXCEPT:

A. tables

B. Queries

C. Forms

D. formula bars

3

Page 4: latihan ictl tingkatan 2

9. The number 487.52 should have a field type of:

A. String

B. Integer

C. Double

D. Boolean

10. Choose the correct hierarchy of data

A. bit, byte, field, record, database

B. bit, field, record, byte, database

C. bit, byte, record, field, database

D. bit, record, byte, field, database

11. A computer network must contain at least ________ computers.

A. one

B. two

C. twenty

D. hundred

12. A _____ is a high-speed network that connects networks in an area such as a city or town and handles

the bulk of communications activity across that region.

A. Local Area Network (LAN)

B. Wide Area Network (WAN)

C. Metropolitan Area Network (MAN)

D. Variable Area Network (VAN)

13. Each electronic document on the Web is called a _____________ which can contain text, graphics,

audio and video.

A. World Wide Web

B. Unified Resource Locator

C. Web page

D. Web browser

14. All these are examples of input devices except ______________

A. mouse

B. lcd projector

C. scanner

D. keyboard

4

Page 5: latihan ictl tingkatan 2

15. Identify which types of application software that enables users to create, edit, format and print textual

documents.

A. Graphic

B. Presentation

C. Spreadsheet

D. Word Processing

16. You want to get connected to the Internet. Which component that will allow you to so?

A. Random Access Memory

B. Network Interface Card

C. Digital Versatile Disk

D. cable

17. Write True (T) or False (F) for the following statements

i) Netiquette is internet etiquette which someone will show bad behavior

while using internet. _______________

ii) Send a SPAM email to other peoples is an example of bad netiquette.

_______________

iii) Mozilla Firefox is an example of Search Engine. _______________

iv) Search Engine is an information retrieval system designed to help users to find

information. _______________

v) Using search engines required us to spend much time to find the information that

we need. _______________

vi) Internet Communication enables us to communicate online even though the peoples

were living in different places. _______________

vii) CPU is stand for Center Processing Unit. _______________

viii) We need computer ethics and laws to guide users from misusing the computer.

Selling pirated software to a friend is an example of law breaking conduct. _______________

ix) A network links two or more computers together to enable data and resource

exchange. _______________

x) User can send e-mail to friends in other countries using LAN. _______________

xi) Netiquette is internet etiquette which someone will show bad behavior while using

internet. _______________

xii) www is stand for wide world web. _______________

xiii) Avant is an example of Search Engine. _______________

xiv) http is stand for hypertext transfer procedure. _______________

5

Page 6: latihan ictl tingkatan 2

18. Match the picture of network hardware component to their correct names below.

6

Network Cable

Wireless Access Point

Network Interface Card

Wireless Network Interface Card

Modem/Switch/Hub

Page 7: latihan ictl tingkatan 2

19. Fill in the blanks with the suitable answer.

a) There are 5 elements in multimedia development. The elements are :

I. _______________________

II. text

III. audio

IV. _______________________

V. video

b) Figure below shows network topology A and B.

c) Name the topology.

A -

__________________________

B - __________________________

d) Give 3 examples of Web Browsers :

I. ___________________________

II. ___________________________

III. ___________________________

20. State the full name of the terms below :

a) RAM – ________________________________________________________________

b) ROM – ________________________________________________________________

c) LCD – ________________________________________________________________

d) DVD – ________________________________________________________________

e) CD – ________________________________________________________________

7

Page 8: latihan ictl tingkatan 2

f) GUI – ________________________________________________________________

g) ICT – ________________________________________________________________

h) ALU – ________________________________________________________________

8